Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is Trigger?
A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or UPDATE) occurs. Triggers are kept in and managed by the DBMS. Triggers are used to maintain the referential integrity of data by changing the data in a systematic fashion. A trigger cannot be called or implemented; DBMS automatically fires the trigger as a result of a data modification to the associated table. Triggers can be viewed as same to stored procedures in that both having of procedural logic that is kept at the database level. Stored procedures, though, are not event-drive and are not attached to a specific table as triggers are. Stored procedures are explicitly implemented by invoking a CALL to the procedure whereas triggers are implicitly executed. In addition, triggers can also execute stored procedures.
intent locking
I need help with some assignments
Describe Physical Data independence ? Physical Data Independence - It is capacity to modify the internal schema without having to change conceptual schema. Therefore, the exter
what is query processing?
What are deadlocks? How can they be avoided? Ans: Deadlock considers to a particular condition when two or more processes are every waiting for another to release a resource,
What is magnetic disks?explain it? Magnetic disk provides the bulk of secondary storage of modern computer system. The disk capacity is growing at over 50% per year. But the st
Explain CNT in the respects of QBE ? CNT: It is one of the aggregation commands given in QBE. It is used to identify number of tuples
What is the difference between WHERE and HAVING clauses?. Predicates in the WHERE clause applies to every tuple while the predicate in the HAVING clause applies to groups.
List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of
Explain how you can define an object model of a system. A list of terms that shall be used by end users to describe state and behaviour of objects in system. Different use
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd